EP1798896A1 - Method for im domain authentication for the terminal user identifier module - Google Patents

Method for im domain authentication for the terminal user identifier module Download PDF

Info

Publication number
EP1798896A1
EP1798896A1 EP06742048A EP06742048A EP1798896A1 EP 1798896 A1 EP1798896 A1 EP 1798896A1 EP 06742048 A EP06742048 A EP 06742048A EP 06742048 A EP06742048 A EP 06742048A EP 1798896 A1 EP1798896 A1 EP 1798896A1
Authority
EP
European Patent Office
Prior art keywords
domain
hss
sqn
sending
cscf
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP06742048A
Other languages
German (de)
French (fr)
Other versions
EP1798896B1 (en
EP1798896A4 (en
Inventor
Hong Huawei Administration Building XIE
Jincheng Huawei Administration Building WANG
Dongming Huawei Administration Building ZHU
Jiongjiong Huawei Administration Building GU
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of EP1798896A1 publication Critical patent/EP1798896A1/en
Publication of EP1798896A4 publication Critical patent/EP1798896A4/en
Application granted granted Critical
Publication of EP1798896B1 publication Critical patent/EP1798896B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present invention relates to the technique of authenticating mobile terminals, and more particularly, to a method and a system for authenticating a terminal subscriber identity module in an IP Multimedia (IM) domain.
  • IM IP Multimedia
  • IMS IP Multimedia Subsystem
  • PS Packet Switched
  • 3G 3 rd Generation
  • IP-CAN IP Connectivity Access Networks
  • the IMS is primarily composed of a Call Session Control Function (CSCF), a Media Gateway (MGW), a Media Resource Function Controller (MRFC), a Media Resource Function Processor (MRFP), a Media Gateway Control Function (MGCF), a Breakout Gateway Control Function (BGCF), a Subscription Locator Function (SLF) and a Policy Decision Function (PDF), and the Session Initiation Protocol (SIP) is generally used for transmitting the control signaling between various components.
  • a call control component is a key component of the IMS, which mainly implements functions such as call control, address translation, charging, and concealing the mobility of mobile User Equipment (UE); a media gateway component is introduced so as to be compatible with the conventional Public Switched Telephone Network (PSTN).
  • PSTN Public Switched Telephone Network
  • the Home Subscriber Server (HSS) of the IMS is a device for use in storing the subscription information of an IMS subscriber.
  • the security function of the IMS includes the authentication of subscribers and the protection of SIP information in the IMS.
  • the security architecture of the IMS is as shown in Figure 2, where the bidirectional authentication mechanism of IMS Authentication and Key Agreement (AKA) is used for the authentication and Security Association (SA) negotiation between UE and the home network, and the hop by hop fashion is adopted for the encryption and the integrity protection of an SIP message.
  • AKA IMS Authentication and Key Agreement
  • SA Security Association
  • IMS IP Multimedia
  • IMS Subscriber Identity Module a dedicated IMS Subscriber Identity Module (ISIM) is used as the authentication module of the subscriber side in the 3 rd Generation Partnership Project (3GPP) protocol, and the AKA mechanism of Universal Mobile Telecommunications System (UMTS) is used.
  • 3GPP 3 rd Generation Partnership Project
  • UMTS Universal Mobile Telecommunications System
  • Step 301 while using an IMS service, UE sends a register request to a Serving Call Session Control Function (S-CSCF) via a Proxy Call Session Control Function (P-CSCF) and an Interrogating Call Session Control Function (I-CSCF) in turn.
  • S-CSCF Serving Call Session Control Function
  • P-CSCF Proxy Call Session Control Function
  • I-CSCF Interrogating Call Session Control Function
  • Step 302 upon receiving the register request, the S-CSCF detects whether a quintuplet Authentication Vector (AV) for the subscriber is saved by the S-CSCF; if yes, the S-CSCF authenticates the subscriber using the AV, i.e. proceeds to Step 304; otherwise, requests an AV from the HSS, i.e. proceeds to Step 303.
  • AV quintuplet Authentication Vector
  • the quintuplet AV here includes a random number (RAND), an Authentication token (AUTN), a Cipher Key (CK) used by a Global System for Mobile communications (GSM) network, an Integrity key (IK) and an expected response (XRES).
  • RAND random number
  • AUTN Authentication token
  • CK Cipher Key
  • GSM Global System for Mobile communications
  • IK Integrity key
  • XRES expected response
  • Step 303 upon receiving the AV request sent from the S-CSCF, the HSS determines the quintuplet AV and sends the quintuplet AV to the S-CSCF.
  • the process of determining the quintuplet AV by the HSS includes: determining a Sequence Number (SQN) by the Authentication Centre (AUC) built in the HSS itself, and generating the quintuplet AV according to the SQN.
  • SQL Sequence Number
  • AUC Authentication Centre
  • the HSS generally sends multiple groups of quintuplet AVs to the S-CSCF in sequence, so that the S-CSCF can obtain multiple groups of quintuplet AVs for authentication via one request.
  • Step 304 the S-CSCF reserves the XRES of the quintuplet AV sent from the HSS or of the quintuplet AV stored by the S-CSCF itself and inserts the RAND, AUTN, CK and IK into an authentication challenge (Auth_Challenge) message, and sends the Auth_Challenge message to the P-CSCF via the I-CSCF.
  • Auth_Challenge an authentication challenge
  • the S-CSCF may select one group of quintuplet AVs in sequence, and other groups of quintuplet AVs will be used in the next authentication for the subscriber.
  • Step 305 the P-CSCF reserves the CK and the IK sent from the S-CSCF via the Auth_Challenge message, and issues the RAND and the AUTN to the UE.
  • the P-CSCF will use the IK and CK reserved by itself as an encryption key in the subsequent sessions.
  • Steps 306-307 the UE sends the RAND and the AUTN received from the P-CSCF to the ISIM; the ISIM verifies the AUTN received from the UE and calculates a response (RES) according to the RAND after the verification has passed, and sends the RES calculated by the ISIM to the UE as an authentication response; the UE returns the RES to the S-CSCF while the ISIM further calculates an IK and an CK according to the RAND and sends the IK and the CK calculated according to the RAND to the UE.
  • RES response
  • the process of verifying the AUTN received from the UE includes: determining whether the Media Access Control (MAC) value contained in the AUTN received from the UE is legitimate and determining whether the Sequence Number (SQN) contained in the AUTN received from the UE is acceptable. At this point, the process of verifying whether the SQN is acceptable is the process of verifying whether resynchronization is needed.
  • MAC Media Access Control
  • SQL Sequence Number
  • the UE sends the RES to the S-CSCF via the P-CSCF and the I-CSCF, and reserves the IK and the CK as encryption key for use in the subsequent sessions.
  • Steps 308-309 the S-CSCF compares the RES in the authentication response sent from the UE with the XRES stored by the S-CSCF itself; if they are identical, determines that the authentication has passed, and sends an authentication success message to the UE via the I-CSCF and P-CSCF; otherwise, determines that the authentication fails.
  • the authentication in the IM domain needs to be implemented by using an ISIM alone in the above procedure, that is to say, at present the configured ISIM is especially used for implementing the authentication in the IM domain while no terminal subscriber identity modules that can be used in 3G include an ISIM at present, which makes it impossible for such terminal subscriber identity modules to implement the authentication in the IM domain through the above procedures.
  • the conventional Universal Integrated Circuit Card (UICC) for 3G generally includes a Universal Subscriber Identity Module (USIM) used for authentication in the Circuit Switched (CS) domain and in the PS domain, which makes it impossible to implement the authentication in the IM domain through the above processing for the ISIM.
  • USIM Universal Subscriber Identity Module
  • HLR Home Location Register
  • the HSS overlaid needs to use the ISIM to implement the authentication while the original HLR can use the original USIM to implement the authentication, thereby requiring the subscriber to replace the original card by a card containing an ISIM.
  • the current operating mode if a subscriber wants to upgrade his UE, there are various solutions including purchasing a new UE or upgrading the old UE via a Java interface or other interfaces provided by UE manufacturers, which are all highly operable.
  • the subscriber wants to change the card, however, he has to change it at the special business spots authorized by operators; meanwhile, in order to guarantee the continuity of services, the International Mobile Subscriber Identity (IMSI) of the new card must be associated in some way with the IMSI of the old card, for example, they must share the same HLR, therefore, the actual operation to change a card is surely very boring.
  • IMSI International Mobile Subscriber Identity
  • the so-called resynchronization means that the USIM will synchronize the SQN HE in an HSS/HLR with the SQN MS saved in the USIM itself in the case that the SQN in the quintuplet AV issued by the HSS/HLR is older than the SQN MS stored by the USIM while the issued SQN is in line with the SQN HE stored by the HSS/HLR and the SQN in the quintuplet AV indicates that the SQN HE is older than the SQN MS .
  • the Visitor Location Register (VLR) corresponding to the CS domain and the Serving GPRS Support Node (SGSN) corresponding to the PS domain in an conventional network generally demand multiple groups of AVs during one accessing process, but use only one group of AVs to conduct the authentication processing each time while saving other AVs automatically.
  • VLR Visitor Location Register
  • SGSN Serving GPRS Support Node
  • the SGSN and the VLR obtain five groups of authentication tuple successively, after one group of authentication tuple is used by the SGSN and the VLR respectively, other four groups of authentication tuples buffered in the SGSN is older than the highest sequence (SQN MS ) received by the USIM.
  • SQN MS the highest sequence
  • the SQN MS stored in the USIM is consistent with the SQN issued by the VLR; therefore, the USIM may synchronize the SQN HE in the HLR by using the SQN MS in the USIM itself, thereby making all the AVs currently stored in the SGSN/VLR invalid.
  • the SQN HE is the individual sequence number stored for each subscriber in the HLR/AUC. It can be seen from the above example, if the difference between the operation frequencies in different domains is large, frequent resynchronization will occur.
  • an ISIM must be contained in the terminal subscriber identity module of the subscriber or the conventional HLR must be replaced. Obviously, on the one hand, it is not realistic to replace the conventional HLR in a short period. On the other hand, including an ISIM in the terminal subscriber identity module would set a relatively high requirement on the terminal subscriber identity module, which often means that the subscriber has to replace the USIM card. Frequently changing a card, however, will surely make IM services much less attractive and increase the difficulty for operators to promote IM services.
  • Embodiments of the present invention provide a method and a system for authenticating a terminal subscriber identity module of UE in an IP Multimedia (IM) domain so that a USIM subscriber can use IM services without changing the USIM card.
  • IM IP Multimedia
  • a method for authenticating a terminal subscriber identity module in an IP Multimedia (IM) domain includes:
  • the request message sent from the HSS to the home device of the UE in Step b includes: an Sending Authentication Information Message containing the type of a requesting node in a Circuit Switched (CS) domain or in a Packet Switched (PS) domain; and the process of allocating the SQN for the UE in Step c includes:
  • the method further includes:
  • the method further includes:
  • the valid range of the SQN allocated for IM domain is less than that of the SQN allocated for the CS domain and/or the PS domain by the home device of the UE.
  • the process of allocating the SQN for the IM domain according to the SQN HE in Step c includes: allocating one or more SQNs for the IM domain; the process of generating the AV based on the SQN includes: generating a group of AVs based on each SQN; and the process of authenticating the terminal subscriber identity module of the UE according to the AV in Step d includes:
  • the method further includes:
  • the method further includes: configuring data information of the terminal subscriber identity module in the HSS; before sending the Sending Authentication Information Message from the HSS to the home device of the UE in Step b, determining, by the HSS, whether the UE subscribes to a CS domain service and/or a PS domain service; performing the process of sending the Sending Authentication Information Message if the UE subscribes to the CS domain service and/or the PS domain service; and calculating the AV according to the data information of the terminal subscriber identity module if the UE does not subscribe to the CS domain service and/or the PS domain service, and performing Step d.
  • An IMS Private Identity (IMPI) of the UE is used as a subscriber identity between the S-CSCF and the HSS, the method further includes:
  • the home device of the UE includes: the Home Location Register (HLR) / Authentication Centre (AUC) of the UE.
  • HLR Home Location Register
  • AUC Authentication Centre
  • the terminal subscriber identity module used by the UE includes: a Universal Subscriber Identity Module (USIM).
  • USIM Universal Subscriber Identity Module
  • a system for authenticating a terminal subscriber identity module in an IP Multimedia (IM) domain includes: UE, an S-CSCF, a home device of the UE, and an HSS, and the UE, for initiating an IM domain register request and interacting relative message for authenticating a terminal subscriber identity module of the UE with the S-CSCF; the S-CSCF, for sending an AV request upon receiving the IM domain register request initiated by the UE, and interacting with the UE for the relative message for authenticating a terminal subscriber identity module of the UE upon receiving an AV sent from the HSS; the HSS, for sending a request message for acquiring the AV upon receiving the AV request sent from the S-CSCF, and sending the AV to the S-CSCF; the home device of the UE, for allocating an SQN for the UE upon receiving the request message for acquiring the AV sent from the HSS, and generating the AV based on the SQN and sending the AV to the HSS.
  • IM IP
  • an SQN is allocated by the current home device of UE and the AV is generated according to the SQN allocated by the current home device, thereafter, the AV generated by the current home device is sent to the S-CSCF via the HSS so that a USIM subscriber can use IM services without changing the USIM card, which greatly reduces the difficulty in promoting an IM service.
  • range of SQN HE is allocated for a CS domain, a PS domain and an IM domain, respectively, and the subscriber identity module may compare the SQN MS of each domain, respectively, so as to solve the problem of frequent resynchronization in the prior art.
  • an HSS needs to be overlaid on the conventional network so as to implement overlaying an IMS on the conventional network.
  • the HSS in order to share a USIM, during an authentication procedure, after receiving an AV request sent from an S-CSCF, the HSS needs to send a Sending Authentication Information Message for acquiring an AV to the home device of UE, such as an HLR/AUC; the HLR/AUC allocates an SQN for the UE, generates the corresponding AV according to the SQN allocated by the HLR/AUC, and sends the AV to the HSS; the HSS sends the AV received from the HLR/AUC to the S-CSCF, which enables a USIM subscriber to implement the authentication in the IM domain.
  • an HSS can simulate a VLR or an SGSN to send a Sending Authentication Information Message for acquiring the AV to the current home device of the UE, for example, an HLR/AUC, and the Sending Authentication Information Message shall contain the type of a requesting node of a CS domain or a PS domain; the HLR/AUC determines whether the home domain of the HSS is the PS domain or the CS domain according to the type of the requesting node contained in the Sending Authentication Information Message, allocates SQNs for the home domain of the HSS and calculates AVs according to the SQNs corresponding to the home domain of the HSS, and sends the AVs to the HSS; and the HSS issues these AVs to the S-CSCF.
  • the HSS before sending to the HLR/AUC the Sending Authentication Information Message for acquiring the AV, the HSS further needs to address the HLR/AUC.
  • the process of addressing the HLR/AUC by the HSS may be implemented fully according to the process of addressing the HLR by an MSC/VLR/SGSN in a conventional network.
  • the message path from the UE to the HSS uses the IMS Private Identity (IMPI) of the UE as a subscriber identifier
  • the message path between the S-CSCF and the HSS uses the IMPI of UE as a subscriber identifier as well; since the MSC/VLR/SGSN addresses the HLR through the IMSI, the HSS needs to implement the conversion from the IMPI into the IMSI and fills the IMSI acquired by the conversion in the Sending Authentication Information Message as a subscriber identifier, and needs to determine the HLR/AUC in which the subscriber is located according to the IMSI and a routing policy of the conventional network.
  • IMPI IMS Private Identity
  • the HSS sends the Sending Authentication Information Message to the destination HLR/AUC according to the locally configured Global Title (GT) code or Destination Point Code (DPC); after receiving a response message responded by the destination HLR/AUC, the HSS implements the conversion from the IMSI into the IMPI and issues the IMPI as a subscriber identifier to the S-CSCF.
  • GT Global Title
  • DPC Destination Point Code
  • the conventional HLR does not need to be upgraded in the above procedure, and a USIM subscriber does not need to replace the USIM card as well. Since IM domain services occupy the valid range of SQN of a CS domain or a PS domain, however, frequent resynchronization may occur to a certain extent, which would reduce the efficiency of the whole system in a certain way. Obviously, since the HSS simulates either VLR or SGSN to initiate a Sending Authentication Information Message to the HLR, the influence of resynchronization involves only the IM domain and the CS domain or only the IM domain and the PS domain.
  • the HSS simulates the VLR or the SGSN
  • the HSS should simulate the SGSN as much as possible to reduce the frequency of resynchronization due to the lower frequency of authentication operation of the PS domain.
  • the HSS may explicitly notify the HLR/AUC that the Sending Authentication Information Message for acquiring an AV comes from the IM domain; the HLR/AUC first determines, according to the Sending Authentication Information Message received, that the UE is located in the IM domain and allocates a SQN for the IM domain in which the UE is located, then generates the AV according to the SQN allocated and sends the AV to the S-CSCF via the HSS.
  • the conventional HLR/AUC needs to be upgraded in this procedure to support new protocol extension.
  • the HLR of the conventional network may allocate the SQNs to be issued for a CS domain, a PS domain and an IM domain, so that the USIM can compare the SQNs of various domains respectively and no unnecessary resynchronization will be caused as long as the SQNs corresponding to the authentication tuple of each domain are issued by the HLR in sequence.
  • the resynchronization problem can be solved by allocating the SQNs for different domains by the HLR.
  • a requesting node type (requestingNodeType) information element is defined in the Sending Authentication Information (MAP-SEND-AUTHENTICATION-INFO) Message in the 3GPP R4/R5/R6 29.002 protocol, which is used for identifying that the type of a requesting node belongs to the CS domain, for example, when the value of the requestingNodeType information element is vlr, or belongs to the PS domain, for example, when the value of the requestingNodeType information element is sgsn.
  • MAP-SEND-AUTHENTICATION-INFO Sending Authentication Information
  • the HLR before issuing an AV to an S-CSCF, the HLR first allocates SQNs in an AUTN in an AV for a CS domain and a PS domain, determines, according to the requestingNodeType information element, whether the type of a requesting node is VLR or SGSN, generates the AV according to the SQNs corresponding to the type of the requesting node, and sends the AV generated to the requesting node.
  • the above operations can guarantee that the SQNs of various domains are issued by the HLR in sequence and enable the SQN MS s managed by the USIM to correspond to the CS domain and the PS domain respectively; and the check of SQNs of various domains are relatively independent without interfering with each other so as to avoid the problem of frequently triggering resynchronization due to the different operation frequencies in the two domains.
  • the solution of the embodiments includes the extension of the Sending Authentication Information Message, and in particular, includes the extension of the requestingNodeType information element contained in the Sending Authentication Information Message.
  • original VLR/SGSN does not need to be changed and may use the original Sending Authentication Information Message to acquire an AV while the HSS overlaid uses the Sending Authentication Information Message extended to acquire an AV, wherein the requestingNodeType information element corresponding to the IM domain should be written as im.
  • the changes thereof primarily include: making the HLR/AUC compatible with the Sending Authentication Information Message extended; allocating SQN HE s by the HLR/AUC for the CS domain, the PS domain and an IM domain respectively, generating a SQN corresponding to the IM domain according to the requestingNodeType information element contained in the Sending Authentication Information Message and the SQN HE of the IM domain, generating an AV according to the SQN, and then sending the AV generated to the network node that initiates the request.
  • Steps 401-402 after receiving an IM domain register request sent from UE, the S-CSCF sends an AV request, Cx-AuthDataReq, to the HSS.
  • Step 403 upon receiving the Cx-AuthDataReq from the S-CSCF, the HSS sends a Sending Authentication Information Message, MAP-SEND-AUTHENTICATION-INFO message, to the current home device of the UE, i.e. HLR/AUC.
  • the requestingNodeType information element contained in the MAP-SEND-AUTHENTICATION-INFO message is filled by im; if the HLR has not been upgraded, the requestingNodeType information element contained in the MAP-SEND-AUTHENTICATION-INFO message is filled by sgsn or vlr, and the sgsn is recommended.
  • the specific process may include: configuring the information in the HSS to indicate whether the HLR can allocate the SQN HE for the IM domain; determining, by the HSS, according to the information, whether the corresponding HLR supports the new protocol extension, and sending the MAP-SEND-AUTHENTICATION-INFO message according to the information.
  • Step 404 upon receiving the MAP-SEND-AUTHENTICATION-INFO message, the HLR/AUC determines, according to the requestingNodeType information element of the MAP-SEND-AUTHENTICATION-INFO message, which domain the message comes from, generates an SQN that meets the requirement of the domain according to the SQN HE saved by itself, and generates the AV according to the SQN and thereafter sends the AV to the HSS as a response message of the MAP-SEND-AUTHENTICATION-INFO message.
  • the HLR/AUC determines that the MAP-SEND-AUTHENTICATION-INFO message comes from the IM domain according to the requestingNodeType information element, the HLR/AUC generates an SQN that meets the requirement of IM domain according to the SQN HE saved by itself; if the HLR/AUC determines that the MAP-SEND-AUTHENTICATION-INFO message comes from the CS domain or the PS domain according to the requestingNodeType information element, the HLR/AUC generates an SQN that meets the requirement of the CS domain or the PS domain according to the SQN HE saved by itself.
  • Step 405 the HSS sends the AV sent from the HLR/AUC to the S-CSCF.
  • Step 406 the S-CSCF authenticates the UE according to the AV sent from the HSS.
  • the specific authentication procedure of the S-CSCF is the same as described by Step 304 and the subsequent steps of Figure 3 except that the ISIM needs to be replaced by an USIM, which will not be further described here.
  • the S-CSCF may request multiple groups of AVs from the HSS.
  • the S-CSCF first determines whether a valid AV is still saved by itself, if so, the S-CSCF can authenticate the UE directly according to the valid AV; otherwise, the S-CSCF sends an AV request to the HSS to request multiple groups of AVs.
  • the MAP-SEND-AUTHENTICATION-INFO message forwarded from the HSS to the HLR/AUC is also used for requesting multiple groups of AVs, and the HLR/AUC may allocate multiple SQNs for the IM domain correspondingly and generate multiple groups of AVs according to these SQNs.
  • the HSS may first determining whether the UE has subscribed to the CS/PS domain service, if so, sends the Sending Authentication Information Message to the home HLR/AUC of the UE.
  • the filled content of requestingNodeType information element in the Sending Authentication Information Message can be determined according to the capability of the HLR/AUC, that is, determined according to whether the HLR/AUC supports the extension of the requestingNodeType information element; if the UE does not subscribe to the CS/PS domain service, the USIM is the same as the conventional ISIM, that is, only supports the IM domain service, which makes it possible to generate and issue an AV in the AUC built in the HSS according to the processing manner of the ISIM.
  • the related data of a USIM as that of an ISIM need to be preset in the HSS.
  • the HLR/AUC may allocate less range of SQNs for the IM domain.
  • FIG. 5 is a diagram illustrating the system for authenticating the USIM of the UE in the IM domain in accordance with an embodiment of the present invention.
  • the system primarily includes: UE, an S-CSCF, a home device of the UE, such as HLR/AUC, and HSS, wherein:

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

A method for authenticating a terminal subscriber identity module in an IM domain includes: after receiving an IM domain register request sent from UE, an S-CSCF sends an AV request to an HSS; the HSS sends to the home device of UE a request message for acquiring the AV; the home device of the UE allocates an SQN for the UE and generates the corresponding AV based on the SQN and sends the AV to the S-CSCF via the HSS; the S-CSCF authenticates the terminal subscriber identity module of the UE according to the AV. A system for authenticating a terminal subscriber identity module in an IM domain includes: UE, an S-CSCF, a home device of the UE and an HSS. The invention enables a USIM subscriber to use IM services without changing the USIM card, which greatly reduces the difficulty in promoting an IM service; and frequent resynchronization is avoid. In addition, the present invention only needs to simply upgrade the HSS and the HLR/AUC, which reduces the cost and the complexity of implementing the authentication in the IM domain in the existing networks.

Description

    Field of the Invention
  • The present invention relates to the technique of authenticating mobile terminals, and more particularly, to a method and a system for authenticating a terminal subscriber identity module in an IP Multimedia (IM) domain.
  • Background of the Invention
  • Multimedia services have been developed to be provided for mobile terminals. The architecture of the present IP Multimedia Subsystem (IMS) providing multimedia services for mobile terminals is as shown in Figure 1. Originally, the IMS is a sub-domain overlaid on the conventional Packet Switched (PS) domain of the 3rd Generation (3G) network, and the sub-domain is especially for use in supporting IP Multimedia (IM) services. When conditions are met, the IMS can also serve subscribers who access the network via a Wireless Local Area Network (WLAN) or other IP Connectivity Access Networks (IP-CAN).
  • As shown in Figure 1, the IMS is primarily composed of a Call Session Control Function (CSCF), a Media Gateway (MGW), a Media Resource Function Controller (MRFC), a Media Resource Function Processor (MRFP), a Media Gateway Control Function (MGCF), a Breakout Gateway Control Function (BGCF), a Subscription Locator Function (SLF) and a Policy Decision Function (PDF), and the Session Initiation Protocol (SIP) is generally used for transmitting the control signaling between various components. A call control component is a key component of the IMS, which mainly implements functions such as call control, address translation, charging, and concealing the mobility of mobile User Equipment (UE); a media gateway component is introduced so as to be compatible with the conventional Public Switched Telephone Network (PSTN). In addition, the Home Subscriber Server (HSS) of the IMS is a device for use in storing the subscription information of an IMS subscriber.
  • The security function of the IMS includes the authentication of subscribers and the protection of SIP information in the IMS. The security architecture of the IMS is as shown in Figure 2, where the bidirectional authentication mechanism of IMS Authentication and Key Agreement (AKA) is used for the authentication and Security Association (SA) negotiation between UE and the home network, and the hop by hop fashion is adopted for the encryption and the integrity protection of an SIP message.
  • Specifically, in the IMS, in order to authenticate an IP Multimedia (IM) subscriber, a dedicated IMS Subscriber Identity Module (ISIM) is used as the authentication module of the subscriber side in the 3rd Generation Partnership Project (3GPP) protocol, and the AKA mechanism of Universal Mobile Telecommunications System (UMTS) is used. The procedure of authenticating subscribers by the IMS system is as shown in Figure 3, which includes the following steps.
  • Step 301: while using an IMS service, UE sends a register request to a Serving Call Session Control Function (S-CSCF) via a Proxy Call Session Control Function (P-CSCF) and an Interrogating Call Session Control Function (I-CSCF) in turn.
  • Step 302: upon receiving the register request, the S-CSCF detects whether a quintuplet Authentication Vector (AV) for the subscriber is saved by the S-CSCF; if yes, the S-CSCF authenticates the subscriber using the AV, i.e. proceeds to Step 304; otherwise, requests an AV from the HSS, i.e. proceeds to Step 303.
  • The quintuplet AV here includes a random number (RAND), an Authentication token (AUTN), a Cipher Key (CK) used by a Global System for Mobile communications (GSM) network, an Integrity key (IK) and an expected response (XRES).
  • Step 303: upon receiving the AV request sent from the S-CSCF, the HSS determines the quintuplet AV and sends the quintuplet AV to the S-CSCF.
  • The process of determining the quintuplet AV by the HSS includes: determining a Sequence Number (SQN) by the Authentication Centre (AUC) built in the HSS itself, and generating the quintuplet AV according to the SQN.
  • Obviously, in order to raise the efficiency, the HSS generally sends multiple groups of quintuplet AVs to the S-CSCF in sequence, so that the S-CSCF can obtain multiple groups of quintuplet AVs for authentication via one request.
  • Step 304: the S-CSCF reserves the XRES of the quintuplet AV sent from the HSS or of the quintuplet AV stored by the S-CSCF itself and inserts the RAND, AUTN, CK and IK into an authentication challenge (Auth_Challenge) message, and sends the Auth_Challenge message to the P-CSCF via the I-CSCF.
  • If the HSS sends multiple groups of quintuplet AVs to the S-CSCF, the S-CSCF may select one group of quintuplet AVs in sequence, and other groups of quintuplet AVs will be used in the next authentication for the subscriber.
  • Step 305: the P-CSCF reserves the CK and the IK sent from the S-CSCF via the Auth_Challenge message, and issues the RAND and the AUTN to the UE.
  • If the system starts the integrity protection and security protection, the P-CSCF will use the IK and CK reserved by itself as an encryption key in the subsequent sessions.
  • Steps 306-307: the UE sends the RAND and the AUTN received from the P-CSCF to the ISIM; the ISIM verifies the AUTN received from the UE and calculates a response (RES) according to the RAND after the verification has passed, and sends the RES calculated by the ISIM to the UE as an authentication response; the UE returns the RES to the S-CSCF while the ISIM further calculates an IK and an CK according to the RAND and sends the IK and the CK calculated according to the RAND to the UE.
  • The process of verifying the AUTN received from the UE includes: determining whether the Media Access Control (MAC) value contained in the AUTN received from the UE is legitimate and determining whether the Sequence Number (SQN) contained in the AUTN received from the UE is acceptable. At this point, the process of verifying whether the SQN is acceptable is the process of verifying whether resynchronization is needed.
  • Specifically, the UE sends the RES to the S-CSCF via the P-CSCF and the I-CSCF, and reserves the IK and the CK as encryption key for use in the subsequent sessions.
  • Steps 308-309: the S-CSCF compares the RES in the authentication response sent from the UE with the XRES stored by the S-CSCF itself; if they are identical, determines that the authentication has passed, and sends an authentication success message to the UE via the I-CSCF and P-CSCF; otherwise, determines that the authentication fails.
  • The authentication in the IM domain needs to be implemented by using an ISIM alone in the above procedure, that is to say, at present the configured ISIM is especially used for implementing the authentication in the IM domain while no terminal subscriber identity modules that can be used in 3G include an ISIM at present, which makes it impossible for such terminal subscriber identity modules to implement the authentication in the IM domain through the above procedures. For example, the conventional Universal Integrated Circuit Card (UICC) for 3G generally includes a Universal Subscriber Identity Module (USIM) used for authentication in the Circuit Switched (CS) domain and in the PS domain, which makes it impossible to implement the authentication in the IM domain through the above processing for the ISIM. Meanwhile, there are no data related to the USIM in the HSS, which makes it impossible to determine the required AV for authenticating a USIM subscriber, and as a result, impossible to authenticate the USIM directly through the above procedures.
  • In order to enable the HSS to complete the authentication of a USIM subscriber, one solution is to integrate the data of a Home Location Register (HLR) into the HSS such that the HSS could obtain the data related to the USIM so as to determine the AV. Obviously, it is necessary to replace the conventional HLRs on a large scale. Since the current IMS networks are still at the initial stage, it is impossible on the whole to replace HLRs on a large scale. A more rational solution is to overlay one or more special HSSes for providing IM services on the conventional networks while the conventional HLRs remain unchanged so as to provide the CS and PS domain services continually. According to the solution proposed by 3GPP, however, the HSS overlaid needs to use the ISIM to implement the authentication while the original HLR can use the original USIM to implement the authentication, thereby requiring the subscriber to replace the original card by a card containing an ISIM. In the current operating mode, if a subscriber wants to upgrade his UE, there are various solutions including purchasing a new UE or upgrading the old UE via a Java interface or other interfaces provided by UE manufacturers, which are all highly operable. If the subscriber wants to change the card, however, he has to change it at the special business spots authorized by operators; meanwhile, in order to guarantee the continuity of services, the International Mobile Subscriber Identity (IMSI) of the new card must be associated in some way with the IMSI of the old card, for example, they must share the same HLR, therefore, the actual operation to change a card is surely very boring.
  • Moreover, even though there are data related to the USIM stored in the HSS and the AV required for authentication of a USIM UE may be determined, other problems still exist, for example, it may cause a resynchronization if one USIM is used for authenticating multiple domains simultaneously. The so-called resynchronization means that the USIM will synchronize the SQNHE in an HSS/HLR with the SQNMS saved in the USIM itself in the case that the SQN in the quintuplet AV issued by the HSS/HLR is older than the SQNMS stored by the USIM while the issued SQN is in line with the SQNHE stored by the HSS/HLR and the SQN in the quintuplet AV indicates that the SQNHE is older than the SQNMS. Furthermore, if both HSS and the HLR store SQNs, the inconsistency problem of SQNs between the HSS and the HLR ma y occur, thus, it necessary to resynchronize the SQNs between the HSS and the HLR.
  • Take the resynchronization between the USIM and the HLR as an example. In order to raise the accessing efficiency of a network, the Visitor Location Register (VLR) corresponding to the CS domain and the Serving GPRS Support Node (SGSN) corresponding to the PS domain in an conventional network generally demand multiple groups of AVs during one accessing process, but use only one group of AVs to conduct the authentication processing each time while saving other AVs automatically. In this case, if operation frequencies in each domain are different, for example, the operation of the subscriber in the CS domain may be more frequent, the SGSN and the VLR obtain five groups of authentication tuple successively, after one group of authentication tuple is used by the SGSN and the VLR respectively, other four groups of authentication tuples buffered in the SGSN is older than the highest sequence (SQNMS) received by the USIM. At this point, the SQNMS stored in the USIM is consistent with the SQN issued by the VLR; therefore, the USIM may synchronize the SQNHE in the HLR by using the SQNMS in the USIM itself, thereby making all the AVs currently stored in the SGSN/VLR invalid. The SQNHE is the individual sequence number stored for each subscriber in the HLR/AUC. It can be seen from the above example, if the difference between the operation frequencies in different domains is large, frequent resynchronization will occur.
  • To sum up, if an IM service is desired at present, an ISIM must be contained in the terminal subscriber identity module of the subscriber or the conventional HLR must be replaced. Obviously, on the one hand, it is not realistic to replace the conventional HLR in a short period. On the other hand, including an ISIM in the terminal subscriber identity module would set a relatively high requirement on the terminal subscriber identity module, which often means that the subscriber has to replace the USIM card. Frequently changing a card, however, will surely make IM services much less attractive and increase the difficulty for operators to promote IM services.
  • Summary of the Invention
  • Embodiments of the present invention provide a method and a system for authenticating a terminal subscriber identity module of UE in an IP Multimedia (IM) domain so that a USIM subscriber can use IM services without changing the USIM card.
  • The solution in accordance with the embodiments of the present invention is as follows.
  • A method for authenticating a terminal subscriber identity module in an IP Multimedia (IM) domain includes:
    1. a. sending, by a Serving Call Session Control Function (S-CSCF) in a network, an Authentication Vector (AV) request to a Home Subscriber Server (HSS) set in the network for providing IM domain services, upon receiving an IM domain register request sent from User Equipment (UE);
    2. b. sending, by the HSS, a request message for acquiring the AV to a home device of the UE upon receiving the AV request;
    3. c. allocating, by the home device of the UE, a Sequence Number (SQN) for the UE upon receiving the request message, generating an AV based on the SQN, and sending the AV to the HSS; sending, by the HSS, the AV to the S-CSCF; and
    4. d. authenticating, by the S-CSCF, the terminal subscriber identity module of the UE according to the AV.
  • The request message sent from the HSS to the home device of the UE in Step b includes: an Sending Authentication Information Message containing the type of a requesting node in a Circuit Switched (CS) domain or in a Packet Switched (PS) domain; and
    the process of allocating the SQN for the UE in Step c includes:
    • determining, by the home device of the UE, whether the domain to which the HSS belongs is the PS domain or the CS domain according to the type of requesting node contained in the Sending Authentication Information Message, and allocating the SQN for the domain to which the HSS belongs.
  • The method further includes:
    • extending the type of the requesting node in the Sending Authentication Information Message to include: CS domain, PS domain and IM domain; and dividing, by the home device of the UE, the individual sequence numbers of each UE, SQNHEs, into three types: CS domain, PS domain and IM domain; and
    • the request message sent from the HSS to the home device of the UE in Step b is the Sending Authentication Information Message; the Sending Authentication Information Message contains the type of the requesting node in IM domain; and
    • the process of allocating the SQN for the UE in Step c includes: determining, by the home device of the UE, that the IM domain is the domain to which the HSS belongs according to the type of requesting node contained in the Sending Authentication Information Message; and allocating the SQN for the IM domain according to the SQNHE corresponding to the IM domain.
  • The method further includes:
    • configuring information for determining that the home device is able to allocate an SQN for the IM domain in the HSS;
    • before sending the Sending Authentication Information Message from the HSS to the home device of the UE in Step b, determining, by the HSS, according to the information configured, whether the home device of the UE is able to allocate the SQN for the IM domain;
    • containing the type of requesting node in the IM domain in the Sending Authentication Information Message if the home device of the UE is able to allocate the SQN for the IM domain; containing the type of requesting node in the CS domain or the PS domain in the Sending Authentication Information Message if the home device of the UE is not able to allocate the SQN for the IM domain.
  • The valid range of the SQN allocated for IM domain is less than that of the SQN allocated for the CS domain and/or the PS domain by the home device of the UE.
  • The process of allocating the SQN for the IM domain according to the SQNHE in Step c includes: allocating one or more SQNs for the IM domain; the process of generating the AV based on the SQN includes: generating a group of AVs based on each SQN; and
    the process of authenticating the terminal subscriber identity module of the UE according to the AV in Step d includes:
    • authenticating the terminal subscriber identity module by selecting a group of AVs from the AVs received, and storing other AVs.
  • The method further includes:
    • before sending the AV request from the S-CSCF to the HSS in Step a, determining, by the S-CSCF, whether there is an AV stored in the S-CSCF for the UE; if there is the AV stored in the S-CSCF for the UE, authenticating the terminal subscriber identity module of the UE according to the AV stored in the S-CSCF; otherwise, sending the AV request to the HSS.
  • The method further includes: configuring data information of the terminal subscriber identity module in the HSS;
    before sending the Sending Authentication Information Message from the HSS to the home device of the UE in Step b, determining, by the HSS, whether the UE subscribes to a CS domain service and/or a PS domain service; performing the process of sending the Sending Authentication Information Message if the UE subscribes to the CS domain service and/or the PS domain service; and
    calculating the AV according to the data information of the terminal subscriber identity module if the UE does not subscribe to the CS domain service and/or the PS domain service, and performing Step d.
  • An IMS Private Identity (IMPI) of the UE is used as a subscriber identity between the S-CSCF and the HSS, the method further includes:
    • before sending the request message from the HSS to the home device of the UE in Step b, converting, by the HSS, the IMPI contained in the AV request into an International Mobile Subscriber Identity (IMSI); determining the home device of the UE according to the IMSI and a routing policy; sending the request message to the home device of the UE for acquiring the AV; and
    • before sending the AV to the S-CSCF in Step d, converting the IMSI into the IMPI; and sending the IMPI and the AV to the S-CSCF.
  • The home device of the UE includes: the Home Location Register (HLR) / Authentication Centre (AUC) of the UE.
  • The terminal subscriber identity module used by the UE includes: a Universal Subscriber Identity Module (USIM).
  • A system for authenticating a terminal subscriber identity module in an IP Multimedia (IM) domain, includes: UE, an S-CSCF, a home device of the UE, and an HSS, and
    the UE, for initiating an IM domain register request and interacting relative message for authenticating a terminal subscriber identity module of the UE with the S-CSCF;
    the S-CSCF, for sending an AV request upon receiving the IM domain register request initiated by the UE, and interacting with the UE for the relative message for authenticating a terminal subscriber identity module of the UE upon receiving an AV sent from the HSS;
    the HSS, for sending a request message for acquiring the AV upon receiving the AV request sent from the S-CSCF, and sending the AV to the S-CSCF;
    the home device of the UE, for allocating an SQN for the UE upon receiving the request message for acquiring the AV sent from the HSS, and generating the AV based on the SQN and sending the AV to the HSS.
  • AS can be seen from the above mentioned technical scheme, an SQN is allocated by the current home device of UE and the AV is generated according to the SQN allocated by the current home device, thereafter, the AV generated by the current home device is sent to the S-CSCF via the HSS so that a USIM subscriber can use IM services without changing the USIM card, which greatly reduces the difficulty in promoting an IM service.
  • Furthermore, in accordance with the embodiments of the present invention, range of SQNHE is allocated for a CS domain, a PS domain and an IM domain, respectively, and the subscriber identity module may compare the SQNMS of each domain, respectively, so as to solve the problem of frequent resynchronization in the prior art.
  • In addition, all the modifications and reconstructions in accordance with the embodiments of the present invention only involve the HSS and the HLR/AUC without any extra requirement for the current GSM/General Packet Radio Service (GPRS)/UMTS, which means only simple upgrading of the HLR/AUC rather than replacement, and make it possible to overlay a special IMS on the conventional network for providing the authentication in the IM domain with less cost and less complexity.
  • Brief Description of the Drawings
    • Figure 1 is a schematic diagram illustrating the conventional IMS structure.
    • Figure 2 is a schematic diagram illustrating the security architecture of an IMS.
    • Figure 3 is a flow chart for authenticating UE by an IMS via an ISIM in the prior art.
    • Figure 4 is a flow chart flow for authenticating the USIM in UE in the IM domain in accordance with an embodiment of the present invention.
    • Figure 5 is a block diagram of the system for authenticating the USIM in UE in the IM domain in accordance with an embodiment of the present invention.
    Detailed Description of the Invention
  • In accordance with embodiments of the present invention, an HSS needs to be overlaid on the conventional network so as to implement overlaying an IMS on the conventional network. In the case that an HSS is overlaid on the conventional network, in order to share a USIM, during an authentication procedure, after receiving an AV request sent from an S-CSCF, the HSS needs to send a Sending Authentication Information Message for acquiring an AV to the home device of UE, such as an HLR/AUC; the HLR/AUC allocates an SQN for the UE, generates the corresponding AV according to the SQN allocated by the HLR/AUC, and sends the AV to the HSS; the HSS sends the AV received from the HLR/AUC to the S-CSCF, which enables a USIM subscriber to implement the authentication in the IM domain.
  • In the case that the UE is a USIM UE, after receiving an AV request sent from an S-CSCF and when needing to acquire an AV from the current home device of the UE, an HSS can simulate a VLR or an SGSN to send a Sending Authentication Information Message for acquiring the AV to the current home device of the UE, for example, an HLR/AUC, and the Sending Authentication Information Message shall contain the type of a requesting node of a CS domain or a PS domain; the HLR/AUC determines whether the home domain of the HSS is the PS domain or the CS domain according to the type of the requesting node contained in the Sending Authentication Information Message, allocates SQNs for the home domain of the HSS and calculates AVs according to the SQNs corresponding to the home domain of the HSS, and sends the AVs to the HSS; and the HSS issues these AVs to the S-CSCF.
  • In addition, in the above process, before sending to the HLR/AUC the Sending Authentication Information Message for acquiring the AV, the HSS further needs to address the HLR/AUC. The process of addressing the HLR/AUC by the HSS may be implemented fully according to the process of addressing the HLR by an MSC/VLR/SGSN in a conventional network. To be specific, since the message path from the UE to the HSS uses the IMS Private Identity (IMPI) of the UE as a subscriber identifier, the message path between the S-CSCF and the HSS uses the IMPI of UE as a subscriber identifier as well; since the MSC/VLR/SGSN addresses the HLR through the IMSI, the HSS needs to implement the conversion from the IMPI into the IMSI and fills the IMSI acquired by the conversion in the Sending Authentication Information Message as a subscriber identifier, and needs to determine the HLR/AUC in which the subscriber is located according to the IMSI and a routing policy of the conventional network. Thereafter the HSS sends the Sending Authentication Information Message to the destination HLR/AUC according to the locally configured Global Title (GT) code or Destination Point Code (DPC); after receiving a response message responded by the destination HLR/AUC, the HSS implements the conversion from the IMSI into the IMPI and issues the IMPI as a subscriber identifier to the S-CSCF.
  • Obviously, the conventional HLR does not need to be upgraded in the above procedure, and a USIM subscriber does not need to replace the USIM card as well. Since IM domain services occupy the valid range of SQN of a CS domain or a PS domain, however, frequent resynchronization may occur to a certain extent, which would reduce the efficiency of the whole system in a certain way. Obviously, since the HSS simulates either VLR or SGSN to initiate a Sending Authentication Information Message to the HLR, the influence of resynchronization involves only the IM domain and the CS domain or only the IM domain and the PS domain.
  • In such case that the HSS simulates the VLR or the SGSN, the HSS should simulate the SGSN as much as possible to reduce the frequency of resynchronization due to the lower frequency of authentication operation of the PS domain.
  • Preferably, in order to completely avoid the possible frequent resynchronization caused by the above, the HSS may explicitly notify the HLR/AUC that the Sending Authentication Information Message for acquiring an AV comes from the IM domain; the HLR/AUC first determines, according to the Sending Authentication Information Message received, that the UE is located in the IM domain and allocates a SQN for the IM domain in which the UE is located, then generates the AV according to the SQN allocated and sends the AV to the S-CSCF via the HSS. Obviously, the conventional HLR/AUC needs to be upgraded in this procedure to support new protocol extension. In other words, the HLR of the conventional network may allocate the SQNs to be issued for a CS domain, a PS domain and an IM domain, so that the USIM can compare the SQNs of various domains respectively and no unnecessary resynchronization will be caused as long as the SQNs corresponding to the authentication tuple of each domain are issued by the HLR in sequence. Since only one network entity of each domain is used for buffering the authentication tuple, for example, the VLR used for buffering the authentication tuple in the CS domain, the SGSN used for buffering the authentication tuple in the PS domain and the S-CSCF used for buffering the authentication tuple in the IM domain, the resynchronization problem can be solved by allocating the SQNs for different domains by the HLR.
  • The specific solution of avoiding frequent resynchronization fully in accordance with embodiments of the present invention is hereinafter described in detail with reference to accompanying drawings and specific embodiments.
  • At present, a requesting node type (requestingNodeType) information element is defined in the Sending Authentication Information (MAP-SEND-AUTHENTICATION-INFO) Message in the 3GPP R4/R5/R6 29.002 protocol, which is used for identifying that the type of a requesting node belongs to the CS domain, for example, when the value of the requestingNodeType information element is vlr, or belongs to the PS domain, for example, when the value of the requestingNodeType information element is sgsn. On the basis of such definition, before issuing an AV to an S-CSCF, the HLR first allocates SQNs in an AUTN in an AV for a CS domain and a PS domain, determines, according to the requestingNodeType information element, whether the type of a requesting node is VLR or SGSN, generates the AV according to the SQNs corresponding to the type of the requesting node, and sends the AV generated to the requesting node. Thus, the above operations can guarantee that the SQNs of various domains are issued by the HLR in sequence and enable the SQNMSs managed by the USIM to correspond to the CS domain and the PS domain respectively; and the check of SQNs of various domains are relatively independent without interfering with each other so as to avoid the problem of frequently triggering resynchronization due to the different operation frequencies in the two domains.
  • Therefore, in order to enable the HLR/AUC to allocate SQNs for the IM domain in which the UE is located so as to avoid the above frequent resynchronization caused by the HSS simulating the VLR or the SGSN, the solution of the embodiments includes the extension of the Sending Authentication Information Message, and in particular, includes the extension of the requestingNodeType information element contained in the Sending Authentication Information Message. To be specific, extend the two enumerated values, a value denoting the CS domain, such as vlr, and a value denoting the PS domain, such as sgsn, to three enumerated values, i.e. the value denoting the CS domain, the value denoting the PS domain, and a value denoting the IM domain, such as im, while other information elements may remain unchanged.
  • After the extension, original VLR/SGSN does not need to be changed and may use the original Sending Authentication Information Message to acquire an AV while the HSS overlaid uses the Sending Authentication Information Message extended to acquire an AV, wherein the requestingNodeType information element corresponding to the IM domain should be written as im. Obviously, the original HLR/AUC needs necessary upgrading, the changes thereof primarily include: making the HLR/AUC compatible with the Sending Authentication Information Message extended; allocating SQNHEs by the HLR/AUC for the CS domain, the PS domain and an IM domain respectively, generating a SQN corresponding to the IM domain according to the requestingNodeType information element contained in the Sending Authentication Information Message and the SQNHE of the IM domain, generating an AV according to the SQN, and then sending the AV generated to the network node that initiates the request.
  • Since the process of acquiring an AV is identical for the AUC and the HLR, the description is hereinafter given with reference to the HLR only.
  • By the above configurations, the detailed flow chart of an authentication process is as shown in Figure 4, which includes the following steps.
  • Steps 401-402: after receiving an IM domain register request sent from UE, the S-CSCF sends an AV request, Cx-AuthDataReq, to the HSS.
  • Step 403: upon receiving the Cx-AuthDataReq from the S-CSCF, the HSS sends a Sending Authentication Information Message, MAP-SEND-AUTHENTICATION-INFO message, to the current home device of the UE, i.e. HLR/AUC.
  • If the HLR has been upgraded to support the new protocol extension, the requestingNodeType information element contained in the MAP-SEND-AUTHENTICATION-INFO message is filled by im; if the HLR has not been upgraded, the requestingNodeType information element contained in the MAP-SEND-AUTHENTICATION-INFO message is filled by sgsn or vlr, and the sgsn is recommended.
  • The specific process may include: configuring the information in the HSS to indicate whether the HLR can allocate the SQNHE for the IM domain; determining, by the HSS, according to the information, whether the corresponding HLR supports the new protocol extension, and sending the MAP-SEND-AUTHENTICATION-INFO message according to the information.
  • Step 404: upon receiving the MAP-SEND-AUTHENTICATION-INFO message, the HLR/AUC determines, according to the requestingNodeType information element of the MAP-SEND-AUTHENTICATION-INFO message, which domain the message comes from, generates an SQN that meets the requirement of the domain according to the SQNHE saved by itself, and generates the AV according to the SQN and thereafter sends the AV to the HSS as a response message of the MAP-SEND-AUTHENTICATION-INFO message.
  • If the HLR/AUC determines that the MAP-SEND-AUTHENTICATION-INFO message comes from the IM domain according to the requestingNodeType information element, the HLR/AUC generates an SQN that meets the requirement of IM domain according to the SQNHE saved by itself; if the HLR/AUC determines that the MAP-SEND-AUTHENTICATION-INFO message comes from the CS domain or the PS domain according to the requestingNodeType information element, the HLR/AUC generates an SQN that meets the requirement of the CS domain or the PS domain according to the SQNHE saved by itself.
  • Step 405: the HSS sends the AV sent from the HLR/AUC to the S-CSCF.
  • Step 406: the S-CSCF authenticates the UE according to the AV sent from the HSS.
  • After obtaining the AV, the specific authentication procedure of the S-CSCF is the same as described by Step 304 and the subsequent steps of Figure 3 except that the ISIM needs to be replaced by an USIM, which will not be further described here.
  • In order to raise the efficiency, after receiving the IM domain register request, the S-CSCF may request multiple groups of AVs from the HSS. In this case, in the above Steps 401-402, after receiving the IM domain register request, the S-CSCF first determines whether a valid AV is still saved by itself, if so, the S-CSCF can authenticate the UE directly according to the valid AV; otherwise, the S-CSCF sends an AV request to the HSS to request multiple groups of AVs. The MAP-SEND-AUTHENTICATION-INFO message forwarded from the HSS to the HLR/AUC is also used for requesting multiple groups of AVs, and the HLR/AUC may allocate multiple SQNs for the IM domain correspondingly and generate multiple groups of AVs according to these SQNs.
  • In addition, if the UE has not subscribed to a CS/PS domain service, i.e. the UE only subscribes to an IM domain service, the resynchronization will not occur. Therefore, after receiving the AV request sent from the S-CSCF, the HSS may first determining whether the UE has subscribed to the CS/PS domain service, if so, sends the Sending Authentication Information Message to the home HLR/AUC of the UE. As described above, the filled content of requestingNodeType information element in the Sending Authentication Information Message can be determined according to the capability of the HLR/AUC, that is, determined according to whether the HLR/AUC supports the extension of the requestingNodeType information element; if the UE does not subscribe to the CS/PS domain service, the USIM is the same as the conventional ISIM, that is, only supports the IM domain service, which makes it possible to generate and issue an AV in the AUC built in the HSS according to the processing manner of the ISIM. Obviously, the related data of a USIM as that of an ISIM need to be preset in the HSS.
  • It should be noted that, in terms of the current application conditions, in comparison with the CS domain and the PS domain, the authentication frequency in IM domain is lower, so the HLR/AUC may allocate less range of SQNs for the IM domain.
  • Figure 5 is a diagram illustrating the system for authenticating the USIM of the UE in the IM domain in accordance with an embodiment of the present invention. As shown in Figure 5, the system primarily includes: UE, an S-CSCF, a home device of the UE, such as HLR/AUC, and HSS, wherein:
    • the UE is for use in initiating an IM domain register request to the S-CSCF, and interact with the S-CSCF for the relevant messages for authenticating a USIM of the UE;
    • the S-CSCF is for use in sending, according to the IM domain register request sent from the UE, an AV request to the HSS, and interact with the UE for the relevant messages for authenticating the USIM in the UE according to the AV sent from the HSS;
    • the HSS is for use in sending, according to the AV request sent by the S-CSCF, to the home device of the UE a request message for acquiring the AV, and sending the AV returned by the home device of the UE to the S-CSCF;
    • the home device of the UE is for use in allocating an SQN for the UE according to the request message for acquiring the AV sent from the HSS, and generating the corresponding AV according to the SQN and sending the AV to the HSS.
  • The foregoing is only preferred embodiments of this invention, and is not for use in limiting the invention. Any modification, equivalent replacement or improvement made under the spirit and principles of this invention should be covered within the protection scope of this invention.

Claims (12)

  1. A method for authenticating a terminal subscriber identity module in an IP Multimedia (IM) domain, comprising:
    a. sending, by a Serving Call Session Control Function (S-CSCF) in a network, an Authentication Vector (AV) request to a Home Subscriber Server (HSS) set in the network for providing IM domain services, upon receiving an IM domain register request sent from User Equipment (UE);
    b. sending, by the HSS, a request message for acquiring the AV to a home device of the UE upon receiving the AV request;
    c. allocating, by the home device of the UE, a Sequence Number (SQN) for the UE upon receiving the request message, generating an AV based on the SQN, and sending the AV to the HSS; sending, by the HSS, the AV to the S-CSCF; and
    d. authenticating, by the S-CSCF, the terminal subscriber identity module of the UE according to the AV.
  2. The method of Claim 1, wherein the request message sent from the HSS to the home device of the UE in Step b comprises: an Sending Authentication Information Message containing the type of a requesting node in a Circuit Switched (CS) domain or in a Packet Switched (PS) domain; and
    the process of allocating the SQN for the UE in Step c comprises:
    determining, by the home device of the UE, whether the domain to which the HSS belongs is the PS domain or the CS domain according to the type of requesting node contained in the Sending Authentication Information Message, and allocating the SQN for the domain to which the HSS belongs.
  3. The method of Claim 2, further comprising:
    extending the type of the requesting node in the Sending Authentication Information Message to comprise: CS domain, PS domain and IM domain; and dividing, by the home device of the UE, the individual sequence numbers of each UE, SQNHEs, into three types: CS domain, PS domain and IM domain; wherein:
    the request message sent from the HSS to the home device of the UE in Step b is the Sending Authentication Information Message; the Sending Authentication Information Message contains the type of the requesting node in IM domain; and
    the process of allocating the SQN for the UE in Step c comprises: determining, by the home device of the UE, that the IM domain is the domain to which the HSS belongs according to the type of requesting node contained in the Sending Authentication Information Message; and allocating the SQN for the IM domain according to the SQNHE corresponding to the IM domain.
  4. The method of Claim 3, further comprising:
    configuring information for determining that the home device is able to allocate an SQN for the IM domain in the HSS;
    before sending the Sending Authentication Information Message from the HSS to the home device of the UE in Step b, determining, by the HSS, according to the information configured, whether the home device of the UE is able to allocate the SQN for the IM domain;
    containing the type of requesting node in the IM domain in the Sending Authentication Information Message if the home device of the UE is able to allocate the SQN for the IM domain; containing the type of requesting node in the CS domain or the PS domain in the Sending Authentication Information Message if the home device of the UE is not able to allocate the SQN for the IM domain.
  5. The method of Claim 3, wherein the valid range of the SQN allocated for IM domain is less than that of the SQN allocated for the CS domain and/or the PS domain by the home device of the UE.
  6. The method of Claim 3, wherein the process of allocating the SQN for the IM domain according to the SQNHE in Step c comprises: allocating one or more SQNs for the IM domain; the process of generating the AV based on the SQN comprises: generating a group of AVs based on each SQN; and
    the process of authenticating the terminal subscriber identity module of the UE according to the AV in Step d comprises:
    authenticating the terminal subscriber identity module by selecting a group of AVs from the AVs received, and storing other AVs.
  7. The method of Claim 6, further comprising:
    before sending the AV request from the S-CSCF to the HSS in Step a, determining, by the S-CSCF, whether there is an AV stored in the S-CSCF for the UE; if there is the AV stored in the S-CSCF for the UE, authenticating the terminal subscriber identity module of the UE according to the AV stored in the S-CSCF; otherwise, sending the AV request to the HSS.
  8. The method of any of Claims 1-7, further comprising: configuring data information of the terminal subscriber identity module in the HSS;
    before sending the Sending Authentication Information Message from the HSS to the home device of the UE in Step b, determining, by the HSS, whether the UE subscribes to a CS domain service and/or a PS domain service; performing the process of sending the Sending Authentication Information Message if the UE subscribes to the CS domain service and/or the PS domain service; and
    calculating the AV according to the data information of the terminal subscriber identity module if the UE does not subscribe to the CS domain service and/or the PS domain service, and performing Step d.
  9. The method of any of Claims 1-7, wherein an IMS Private Identity (IMPI) of the UE is used as a subscriber identity between the S-CSCF and the HSS, the method further comprising:
    before sending the request message from the HSS to the home device of the UE in Step b, converting, by the HSS, the IMPI contained in the AV request into an International Mobile Subscriber Identity (IMSI); determining the home device of the UE according to the IMSI and a routing policy; sending the request message to the home device of the UE for acquiring the AV; and
    before sending the AV to the S-CSCF in Step d, converting the IMSI into the IMPI; and sending the IMPI and the AV to the S-CSCF.
  10. The method of any of Claims 1-7, wherein the home device of the UE is the Home Location Register (HLR) / Authentication Centre (AUC) of the UE.
  11. The method of Claims 1, wherein the terminal subscriber identity module used by the UE comprises: a Universal Subscriber Identity Module (USIM).
  12. A system for authenticating a terminal subscriber identity module in an IP Multimedia (IM) domain, comprising: User Equipment (UE), a Serving Call Session Control Function (S-CSCF), a home device of the UE, and an HSS, wherein:
    the UE, for initiating an IM domain register request and interacting relative message for authenticating a terminal subscriber identity module of the UE with the S-CSCF;
    the S-CSCF, for sending an Authentication Vector (AV) request upon receiving the IM domain register request initiated by the UE, and interacting with the UE for the relative message for authenticating a terminal subscriber identity module of the UE upon receiving an AV sent from the HSS;
    the Home Subscriber Server (HSS), for sending a request message for acquiring the AV upon receiving the AV request sent from the S-CSCF, and sending the AV to the S-CSCF;
    the home device of the UE, for allocating a Sequence Number (SQN) for the UE upon receiving the request message for acquiring the AV sent from the HSS, and generating the AV based on the SQN and sending the AV to the HSS.
EP06742048A 2005-05-31 2006-05-31 Method for im domain authentication for the terminal user identifier module Active EP1798896B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNB2005100733639A CN100428848C (en) 2005-05-31 2005-05-31 Method for authenticating IP multi-media zone to terminal user mark module
PCT/CN2006/001161 WO2006128373A1 (en) 2005-05-31 2006-05-31 A method for im domain authenticating for the terminal user identifier module and a system thereof

Publications (3)

Publication Number Publication Date
EP1798896A1 true EP1798896A1 (en) 2007-06-20
EP1798896A4 EP1798896A4 (en) 2007-12-12
EP1798896B1 EP1798896B1 (en) 2011-07-13

Family

ID=37134016

Family Applications (1)

Application Number Title Priority Date Filing Date
EP06742048A Active EP1798896B1 (en) 2005-05-31 2006-05-31 Method for im domain authentication for the terminal user identifier module

Country Status (6)

Country Link
US (1) US8027666B2 (en)
EP (1) EP1798896B1 (en)
CN (1) CN100428848C (en)
AT (1) ATE516682T1 (en)
HK (1) HK1099153A1 (en)
WO (1) WO2006128373A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009002488A1 (en) * 2007-06-25 2008-12-31 Lucent Technologies Inc. A method and apparatus for provisioning and authentication/registration for femtocell users on ims core network
WO2009029169A1 (en) * 2007-08-27 2009-03-05 Lucent Technologies Inc. Method and system of communication using extended sequence number
US8027681B2 (en) 2007-06-05 2011-09-27 Alcatel Lucent Method and apparatus to allow hand-off from a macrocell to a femtocell
RU2518441C2 (en) * 2008-05-28 2014-06-10 Майкрософт Корпорейшн Techniques to provide and manage digital telephone to authenticate with network

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005125261A1 (en) * 2004-06-17 2005-12-29 Telefonaktiebolaget Lm Ericsson (Publ) Security in a mobile communications system
CN100428848C (en) 2005-05-31 2008-10-22 华为技术有限公司 Method for authenticating IP multi-media zone to terminal user mark module
DE602006011282D1 (en) * 2005-07-05 2010-02-04 Huawei Tech Co Ltd AUTHENTICATION PROCEDURE FOR THE IP MULTIMEDIA SUBSYSTEM
JP4909773B2 (en) * 2007-03-16 2012-04-04 日本電気株式会社 Home subscriber server configuration method, configuration system, program, and storage medium
US20080304451A1 (en) * 2007-06-05 2008-12-11 Lucent Technologies, Inc. Method to allow hand-off of a cdma mobile from ims femtocell to circuit msc
US20080304462A1 (en) * 2007-06-05 2008-12-11 Lucent Technologies, Inc. SESSION INITIATION PROTOCOL/INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM BASED ARCHITECTURE FOR SUPPORTING 3G1x VOICE/DATA
US20080316976A1 (en) * 2007-06-25 2008-12-25 Lucent Technologies, Inc. METHOD AND APPARATUS FOR SIGNALING INTERWORKING CDMA 3G1x MOBILES AND EVDO MOBILES WITH AN IMS CORE NETWORK
WO2009001433A1 (en) * 2007-06-25 2008-12-31 Panasonic Corporation Wireless communication unit and mobile terminal device as well as wireless authentication control method
CN101141258B (en) * 2007-10-12 2010-06-02 中兴通讯股份有限公司 Method and system for completing authentication in software installation process
CN101466096B (en) * 2007-12-17 2010-07-21 大唐移动通信设备有限公司 Method and system for triggering synchronous failure of authentication process
US9967132B2 (en) * 2008-04-08 2018-05-08 Nokia Solutions And Networks Oy Correlating communication sessions
US8181030B2 (en) * 2008-12-02 2012-05-15 Electronics And Telecommunications Research Institute Bundle authentication system and method
US9729529B2 (en) * 2008-12-31 2017-08-08 Google Technology Holdings LLC Device and method for providing bootstrapped application authentication
CN101730171B (en) * 2009-05-27 2013-01-16 中兴通讯股份有限公司 Switching control method and switching control system
US8645695B2 (en) * 2009-10-07 2014-02-04 Blackberry Limited System and method for managing security key architecture in multiple security contexts of a network environment
CN102056171A (en) * 2009-11-10 2011-05-11 中国移动通信集团公司 Method, system and device for authentication of user card roaming in different networks
CN102056132B (en) * 2009-11-10 2013-06-05 中国移动通信集团公司 Method, system and device for authenticating user cards roaming among different networks
CN102215474B (en) * 2010-04-12 2014-11-05 华为技术有限公司 Method and device for carrying out authentication on communication equipment
US8712409B2 (en) * 2012-03-05 2014-04-29 T-Mobile Usa, Inc. System and method for terminating communication sessions with roaming mobile devices
US9537663B2 (en) 2012-06-20 2017-01-03 Alcatel Lucent Manipulation and restoration of authentication challenge parameters in network authentication procedures
CN102833820A (en) * 2012-08-20 2012-12-19 中国联合网络通信集团有限公司 Internet protocol multimedia subsystem (IMS) access processing method, universal user identification module and terminal equipment
CN103702328B (en) * 2012-09-28 2017-11-21 中国电信股份有限公司 UIM clampings enter the authentication method and system of EPC networks
US20140153722A1 (en) * 2012-12-03 2014-06-05 Semyon Mizikovsky Restricting use of mobile subscriptions to authorized mobile devices
CN103607709A (en) * 2013-12-09 2014-02-26 中国联合网络通信集团有限公司 Method and device for managing user data
EP3132627B1 (en) * 2014-04-17 2018-10-03 Mavenir Systems, Inc. Gsm a3/a8 authentication in an ims network
US10355965B1 (en) * 2014-07-14 2019-07-16 Sprint Communications Company L.P. Leveraging a capacity indicator of a mobility management entity
WO2016086355A1 (en) * 2014-12-02 2016-06-09 华为技术有限公司 Authentication method within wireless communication network, related apparatus and system
US9451421B1 (en) 2015-06-30 2016-09-20 Blackberry Limited Method and system to authenticate multiple IMS identities
US11297111B2 (en) 2015-06-30 2022-04-05 Blackberry Limited Establishing a session initiation protocol session
CN109644335B (en) * 2016-09-05 2021-03-30 华为技术有限公司 Identification information processing method, database control system and related equipment
CN109756896B (en) * 2017-11-02 2022-04-29 中国移动通信有限公司研究院 Information processing method, network equipment and computer readable storage medium
CN109803261B (en) 2017-11-17 2021-06-22 华为技术有限公司 Authentication method, equipment and system
PL3777269T3 (en) * 2018-04-05 2022-11-21 Nokia Technologies Oy Unified subscription identifier management in communication systems
US11991525B2 (en) 2021-12-02 2024-05-21 T-Mobile Usa, Inc. Wireless device access and subsidy control
CN115022878B (en) * 2022-08-08 2022-11-11 中国电子科技集团公司第三十研究所 Method, apparatus and medium for takeover of selected VoLTE user

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2253101A1 (en) * 2004-09-17 2006-05-16 Vodafone España, S.A. Authentication vector (AV) requesting and dispatching method involves generating AV based on type of service, and sending third message containing AV to IMS network

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6259914B1 (en) * 1998-08-07 2001-07-10 Bellsouth Intellectual Property Corporation Method and apparatus for implementing international wireless roaming
GB0004178D0 (en) * 2000-02-22 2000-04-12 Nokia Networks Oy Integrity check in a communication system
US7024688B1 (en) * 2000-08-01 2006-04-04 Nokia Corporation Techniques for performing UMTS (universal mobile telecommunications system) authentication using SIP (session initiation protocol) messages
DE10116547A1 (en) * 2001-04-03 2002-10-10 Nokia Corp Registration of a terminal in a data network
NO20020724D0 (en) * 2002-02-13 2002-02-13 Ericsson Telefon Ab L M Procedure for improved privacy of cell phone location services
US20030159067A1 (en) * 2002-02-21 2003-08-21 Nokia Corporation Method and apparatus for granting access by a portable phone to multimedia services
US7624266B2 (en) * 2002-03-22 2009-11-24 Nokia Corporation System and method using temporary identity for authentication with session initiation protocol
US6938090B2 (en) * 2002-04-26 2005-08-30 Nokia Corporation Authentication and protection for IP application protocols based on 3GPP IMS procedures
DE10223248A1 (en) * 2002-05-22 2003-12-04 Siemens Ag Method for registering a communication terminal
WO2004019640A1 (en) * 2002-08-16 2004-03-04 Siemens Aktiengesellschaft Method for identifying a communications terminal
DE10297809D2 (en) * 2002-08-16 2005-07-07 Ag Siemens A method for authenticating a user of a communication terminal when registering in and using a service network
EP1414212B1 (en) * 2002-10-22 2005-10-12 Telefonaktiebolaget LM Ericsson (publ) Method and system for authenticating users in a telecommunication system
US8755822B2 (en) * 2003-01-13 2014-06-17 Nokia Corporation Method and system for locating a mobile terminal
US20040137918A1 (en) * 2003-01-13 2004-07-15 Tomi Varonen Method and system for locating a mobile terminal
US8374631B2 (en) * 2003-01-15 2013-02-12 Nokia Corporation Provision of location information in a communication system
WO2004100431A2 (en) * 2003-05-02 2004-11-18 Interdigital Technology Corporation Method and architecture for accessing an internet protocol multimedia subsystem (ims) over a wireless local area network (wlan)
GB0324364D0 (en) * 2003-10-17 2003-11-19 Nokia Corp Authentication of messages in a communication system
US7301938B2 (en) * 2004-04-14 2007-11-27 Lucent Technologies Inc. Method of transferring a packet switched to a circuit switched call
GB0422275D0 (en) * 2004-10-07 2004-11-10 Nokia Corp Callback services in a communication system
CN100428848C (en) 2005-05-31 2008-10-22 华为技术有限公司 Method for authenticating IP multi-media zone to terminal user mark module
CN101053203B (en) 2005-05-31 2010-09-08 华为技术有限公司 Method and system for authenticating internet multimedia domain of terminal user identification module

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2253101A1 (en) * 2004-09-17 2006-05-16 Vodafone España, S.A. Authentication vector (AV) requesting and dispatching method involves generating AV based on type of service, and sending third message containing AV to IMS network

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); 3G security; Access security for IP-based services (3GPP TS 33.203 version 6.6.0 Release 6); ETSI TS 133 203" March 2005 (2005-03), ETSI STANDARDS, EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTE, SOPHIA-ANTIPO, FR , XP014028219 * pages 13-15, section 6.1 * * page 30, section 8.2 * * page 37, annex G * *
See also references of WO2006128373A1 *
SIEMENS: "CHANGE REQUEST TO 29.002 v 5.3.0: Requesting Node Type" 3GPP TSC CN WG4 MEETING #17, BANGKOK, THAILAND, NOVEMBER 2002, 29 October 2002 (2002-10-29), XP002457586 *
VODAFONE: "On the use of R99/Rel-4 USIMs for IMS access" 3GPP TSG SA WG3 SECURITY, 27-30 NOVEMBER, SOFIA ANTIPOLIS, FRANCE, November 2001 (2001-11), XP002457587 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8027681B2 (en) 2007-06-05 2011-09-27 Alcatel Lucent Method and apparatus to allow hand-off from a macrocell to a femtocell
WO2009002488A1 (en) * 2007-06-25 2008-12-31 Lucent Technologies Inc. A method and apparatus for provisioning and authentication/registration for femtocell users on ims core network
US7970398B2 (en) 2007-06-25 2011-06-28 Alcatel-Lucent Usa Inc. Method and apparatus for provisioning and authentication/registration for femtocell user on IMS core network
WO2009029169A1 (en) * 2007-08-27 2009-03-05 Lucent Technologies Inc. Method and system of communication using extended sequence number
US8265593B2 (en) 2007-08-27 2012-09-11 Alcatel Lucent Method and system of communication using extended sequence number
RU2518441C2 (en) * 2008-05-28 2014-06-10 Майкрософт Корпорейшн Techniques to provide and manage digital telephone to authenticate with network

Also Published As

Publication number Publication date
HK1099153A1 (en) 2007-08-03
ATE516682T1 (en) 2011-07-15
US20080064369A1 (en) 2008-03-13
CN100428848C (en) 2008-10-22
EP1798896B1 (en) 2011-07-13
EP1798896A4 (en) 2007-12-12
CN1852553A (en) 2006-10-25
US8027666B2 (en) 2011-09-27
WO2006128373A1 (en) 2006-12-07

Similar Documents

Publication Publication Date Title
US8027666B2 (en) Method and system for authenticating terminal subscriber identity module in IP multimedia domain
US7822407B2 (en) Method for selecting the authentication manner at the network side
US8335487B2 (en) Method for authenticating user terminal in IP multimedia sub-system
CN100596084C (en) Method for accessing IMS network to mobile circuit domain user and its registering method
US8191116B1 (en) User equipment validation in an IP network
KR100744093B1 (en) Mobile network having ip multimedia subsystem ims entities and solutions for providing simplification of operations and compatibility between different ims entities
EP2084882B1 (en) Authentication in a communications network
US8887235B2 (en) Authentication interworking
CN102474523B (en) Methods and apparatuses for initiating provisioning of subscriber data in a hss of an IP multimedia subsystem network
US20080091824A1 (en) Providing Mobile Core Services Independent of a Mobile Device
WO2007036123A1 (en) A method and communication system for the cs domain user accessing the ims domain
WO2017092229A1 (en) Multiservice-based ims registration method and ims registration system
WO2008116804A1 (en) Method for providing subscriptions to packet-switched networks
CN1929678B (en) Method and device for updating user terminal switch-in code
CN114667751A (en) Method for supporting authentication of user equipment
KR20090034938A (en) Communication control method and communication control apparatus
CN100459804C (en) Device, system and method of authenticating when terminal to access second system network
EP2520067B1 (en) Method for providing ip services to a user of a public network
US9060005B2 (en) Method, apparatus, system and related computer program product for handover management
CN106790055B (en) Registration method and device of IMS (IP multimedia subsystem)
KR20080016610A (en) A terminal, an emergency centre, a network; a network element, a system and a method for establishing an emergency session using a terminal identity
CN102857900B (en) Access method of access equipment to IMS (IP multimedia subsystem) network and AGCF (access gateway control function) and S-CSCF (serving-call session control function)
CN108668274A (en) A kind of method and device for realizing VoLTE IMS registrations
CN101053203B (en) Method and system for authenticating internet multimedia domain of terminal user identification module
CN115022878B (en) Method, apparatus and medium for takeover of selected VoLTE user

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20070502

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK YU

A4 Supplementary search report drawn up and despatched

Effective date: 20071114

RIC1 Information provided on ipc code assigned before grant

Ipc: H04Q 7/38 20060101ALI20071107BHEP

Ipc: H04L 29/06 20060101AFI20071107BHEP

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20081010

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 29/06 20060101ALI20110124BHEP

Ipc: H04W 12/06 20090101AFI20110124BHEP

RIN1 Information on inventor provided before grant (corrected)

Inventor name: XIE, HONG,HUAWEI ADMINISTRATION BUILDING

Inventor name: WANG, JINCHENG,HUAWEI ADMINISTRATION BUILDING

Inventor name: ZHU, DONGMING,HUAWEI ADMINISTRATION BUILDING

Inventor name: GU, JIONGJIONG,HUAWEI ADMINISTRATION BUILDING

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602006023073

Country of ref document: DE

Effective date: 20110908

REG Reference to a national code

Ref country code: NL

Ref legal event code: VDEP

Effective date: 20110713

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 516682

Country of ref document: AT

Kind code of ref document: T

Effective date: 20110713

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111113

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111114

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

Ref country code: BE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111014

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

26N No opposition filed

Effective date: 20120416

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602006023073

Country of ref document: DE

Effective date: 20120416

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120531

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120531

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120531

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111024

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20111013

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110713

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060531

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 11

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 12

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 13

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20230411

Year of fee payment: 18

Ref country code: DE

Payment date: 20230404

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20230406

Year of fee payment: 18